At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Trusted communications with child processes
A method to identify a child process to a parent process in an operating system includes obtaining a token and login identifier from the operating system. The...
Operating system independent architecture for subscription computing
A system for managing a subscription-based computer independent of an operating system of the computer may include a security module that accesses, decrements,...
System and method for managing electronic communications
A method and system are provided for allowing a user to efficiently manage communications. A system for allowing a user having a unique identity is provided,...
Positive and negative event-based testing
Technologies for performing positive and negative event-based testing of systems such as software and the like. Such technologies may be applied to any type of...
Continuation based runtimes in transactions
A continuation based runtime participates in transactions that are not generated by the continuation based runtime, but rather are generated externally to the...
System and method for registering a subscription of interest of needed new
resource in a store accessible by a...
Various technologies and techniques are disclosed for propagating resources during a distributed build process. Subscription of interest is registered in...
Synchronizing virtual machine and application life cycles
A virtual environment can be configured to coordinate life cycles of virtual machines and application programs executing therein. In one implementation, the...
Automatic load and balancing for virtual machines to meet resource
The embodiments contemplate a system and method for a provisioning, retirement and configuration of virtual machines. A predefined policy may include a desired...
Dynamic software fingerprinting
Embodiments of dynamic software fingerprinting techniques are presented herein. In an implementation, an inventory of applications installed on a client is...
Fit and fill techniques for pictures
Various technologies and techniques are disclosed for fitting and filling pictures in documents. A selection is received from a user to perform a fill or fit to...
Butterfly diagrams enabling multi-dimensional performance analysis
A method for multi-dimensional performance analysis may be provided. A plurality of data may be displayed in a butterfly diagram comprising a data grid, a...
Extensible value types in cells
Individual cells within a spreadsheet may contain an extensible value as defined by an extensible value type. The extensible value type is a user defined value...
Power management for large memory subsystems
A power management system is provided. The system includes a permanent storage medium that has a plurality of storage segments that are individually...
Protocol-Independent remote attestation and sealing
Messages, including messages in conformance with various protocols, can be hashed and the hash values added to an event log and provided to a Trusted Platform...
Heterogeneous storage array optimization through eviction
A storage system can comprise storage devices having storage media with differing characteristics. An eviction handler can receive information regarding the...
Wait loss synchronization
Synchronizing threads on loss of memory access monitoring. Using a processor level instruction included as part of an instruction set architecture for a...
Multiple cache directories
A first portion of an identifier can be used to assign the identifier to a slot in a first directory. The identifier can identify a cache unit in a cache. It...
Adaptable management in sync engines
Synchronization of two or more items can be optimized through the use of parallel execution of synchronization tasks and adaptable processing that monitors and...
Representation, decision models, and user interface for encoding managing
preferences, and performing automated...
The present invention relates to a system and methodology providing a user interface that can be employed by contactors and contactees in conjunction with a...
Authorizing service requests in multi-tiered applications
Services of a multi-tier application can authorize (e.g., including authenticating) each other with one or more service access tokens provided by a security...
Stateless distributed computer architecture with server-oriented
state-caching objects maintained on network or...
A stateless distributed computer architecture allows state-caching objects, which hold server state information, to be maintained on a client or network rather...
XML-based web feed for web access of remote resources
Techniques for XML (Extensible Markup Language) web feeds for web access of remote resources are described. In one embodiment, a method includes obtaining...
Bottom-up analysis of network sites
An approach for identifying suspect network sites in a network environment entails using one or more malware analysis modules to identify distribution sites...
Message data management
A workflow manager application transfers message data received from an originating device via a communication network to a target application for processing. A...
Rich signaling feedback mechanism for group communication
Managing a web based conference. The web based conference includes one or more presenters connected through a network to one or more conference attendees. The...
Roaming personal information items across multiple computing devices using
an IMAP server
Technologies for roaming personal information items across multiple computing devices using an IMAP server are provided. When a change is detected to a personal...
Supporting serendipitous group interaction based on user activities
The disclosed functionality enables non-sessions users of an activity session to be provided awareness of the session. The non-sessions users are made aware of...
Techniques to automatically syndicate content over a network
Techniques to automatically syndicate content over a network are described. An apparatus may comprise a client computer having a processing system with a...
Distributed routing table interface
Application programming interface (API) for starting and accessing distributed routing table (DRT) functionality. The API facilitates bootstrapping into the DRT...
Electronic data interchange (EDI) data dictionary management and
An EDI data dictionary management and versioning system is provided having reusable EDI building blocks that are stored in relational format. Reusable EDI...
Facilitating advertisement selection using advertisable units
Systems, methods, and computer storage media having computer-executable instructions embodied thereon that facilitate advertisement selection using advertising...
Visualizing hyperlinks in a search results list
Generating and displaying an enhanced list of search results appropriate for web searching are described. A method for generating an enhanced list of search...
Index optimization for ranking using a linear model
Technologies are described herein for providing a more efficient approach to ranking search results. One method reduces an amount of ranking data analyzed at...
Efficiently and reliably providing message related data
The principles of the present invention extend to efficiently and reliably providing message related data. Generally, data fields of electronic messages and...
Cross-channel coauthoring consistency
A computing device includes a processing unit, and a memory with instructions that, when executed by the processing unit, cause the processing unit to create: a...
Project management applications utilizing summary tasks for top-down
Embodiments of the present invention are directed toward providing a method utilizing project management software for creating a project plan utilizing a...
Focus tracking in dialogs
Controls are provided for a web server to generate client side markups that include recognition and/or audible prompting. The controls comprise elements of a...
Human-assisted pronunciation generation
Pronunciation generation may be provided. First, a pronunciation interface may be provided. The pronunciation interface may be configured to display a word and...
Piecewise-based variable-parameter Hidden Markov Models and the training
A speech recognition system uses Gaussian mixture variable-parameter hidden Markov models (VPHMMs) to recognize speech under many different conditions. Each...
Flat-panel optical projection apparatus
A light guide of the tapered-waveguide type includes an input slab (30) for expanding a projected image between an input end and an output end, and an output...
Navigating images using image based geometric alignment and object based
Over the past few years there has been a dramatic proliferation of digital cameras, and it has become increasingly easy to share large numbers of photographs...
Method for overlapping visual slices
Image editing tools are commonly used to assist with manipulating and saving visual compositions. Many image editing tools provide slicing functionality to...
Combining online and offline recognizers in a handwriting recognition
Described is a technology by which online recognition of handwritten input data is combined with offline recognition and processing to obtain a combined...
Encoding and decoding methods and systems
Methods and systems enable uncompressed source data, corresponding to previously-compressed data, to be manipulated or otherwise modified, prior to being...
Reducing key picture popping effects in video
Techniques and tools are described for reducing key picture popping effects. In some embodiments, an encoding system filters a video picture that is to be...
Data center interconnect and traffic engineering
A system for commoditizing data center networking is disclosed. The system includes an interconnection topology for a data center having a plurality of servers...
Network connectivity determination based on passive analysis of
connection-oriented path information
Passive analysis connection detection architecture that leverages connection-oriented end-to-end stack protocol information. In a TCP/IP implementation, by...
Remoting sub-pixel resolved characters
Remoting sub-pixel defined text. Text is remoted at sub-pixel precision in a computing environment including a terminal server and a terminal client. At a...
Keyboard with plural key switch matrices to detect ghosting
Keyboard apparatus and methods for processing keyboard depressions are disclosed. One disclosed keyboard apparatus includes a keyboard having a plurality of...
Display screen with an icon